next up previous
Next: Real and Effective IDs Up: Security Hole: Programs Without Previous: Security Hole: Programs Without

Sticky Bits


next up previous
Next: Real and Effective IDs Up: Security Hole: Programs Without Previous: Security Hole: Programs Without
Cem Ozdogan 2007-05-07